-
Notifications
You must be signed in to change notification settings - Fork 51
Check expiry #32
base: master
Are you sure you want to change the base?
Check expiry #32
Conversation
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed, please reply here (e.g.
|
Signed it. |
CLAs look good, thanks! |
Been thinking about this. Not sure it's the best way because:
I would think an
wdyt? I like |
I'm definitly open on the wording :) Some thoughts on the external expr $(expr $(date '+%s' --date "$(sudo openssl x509 -enddate -noout -in example.com.crt |grep 'notAfter' |cut -d= -f2)") - $(date '+%s')) / 24 / 3600 Especially since it's only a few lines of Go code, without any further dependencies, I'd vote for doing this internally. |
Ok, yeah, there's value in doing it internally but I really want to keep commands behavior to a minimum when it comes to a critical decision (e.g. whether to re-issue a cert or not). So, here's what I would do:
how does that sound? |
As the official |
Precisely. Or, it could also be an option to the
Now that I'm looking at it, seems simpler than adding a new Do you see any scenarios I'm missing, which would require a separate |
Not sure if this is an issue, but I can think of one reason to split it into two commands: If this is an issue, it might be also be solved by requiring a Besides that, I have no personal preference between |
Ok, let's go with a separate |
Sounds great. |
AFAIK re-issuing a cert does not revoke the existing one, so it should be safe. But, like you said, we can always add '-force' arg to |
Yeah, the issue would rather be load on the letsencrypt servers than inaccessibility of our services. |
This seems to fit letsencrypt better, as it sends out certificate renew reminder emails ~19 days before expiry
I just started using acme, discovered renewal wasn't implemented, but then found this lovely pull request! What are the chances of a merge and release before my next renewal? 😉 |
Are these changes likely to land? |
@jdub what is it exactly that you'd need? Could you sum-up what the need is, in a bullet list style. |
Hmm, that's odd,
|
if you have already issued at least one certificate in the past, the next time invocation of merely |
Oh, without
I can't see a verbose option… is there an environment variable, perhaps? |
That is strange. I've just done it about 30 min ago. The reason it works is, Let's Encrypt remembers all identifiers (domains) that an account has been previously authorized for. It could be the case though, that by running What should work is:
It may be arguable that a command like |
Yeah, the new authorisation theory makes sense. D'oh! I'll have to wait for the next renewal period to try it the right way. Thanks for your help! (I do think a |
Three months later… unfortunately:
|
I'm getting the same |
@chr4 I don't think so. This bug is just a helper to renew the certs easier. But it should already work regardless. What challenge type are you using? |
@x1ddos you're right. This was actually due to a misconfiguration of nginx, the challenges weren't served. While you're here: Any news on the support for only renewing certificates when they're about to expire? I'm still using my fork to achieve this. Let me know if there's anything that I can help implementing! |
I hacked together a quick check:
.crt
is present and readable.crt
and check whether it's valid for more than a weekexit(1)
if soThis solves #30 (for me) (in a quick way)